K8s is a powerful platform which can be abused in many ways if not configured properly. Contributors to this guide are running Kubernetes in production and worked on several K8s projects to learn about security flaws the hard way.

This guide scores major points for having battle-hardened contributors. I also dig how they indicate the severity/importance of each topic with an emoji. Look out for the 💥s!

Get the latest news and podcasts for developers in your inbox, every week. We make it super easy to keep up with developer news that matters.